Professional Documents
Culture Documents
STEGANOGRAPHY
STEGANOGRAPHY
CONTNENTS
Introduction:Steganographic techniques:Applications:Advantages:Disadvantages:Conclusion:References:-
Introduction
History: Greek(440 BC)
Working Principle
INFO
Encryption Key
STEGO OUTPUT
COVER MEDIUM
Steganographic techniques
Physical steganography:Digital steganography:Network steganography:Printed steganography:Text steganography:Steganography using Sudoku Puzzle:-
Digital Stegnography:Image
Images have a lot of data:Spam Mail: 1,108 Bytes Picture of Dave: 152 KB Ways to hide information:Least significant bit (BMP) Palette Shifts (GIF) Discrete Cosine Transforms (JPG)
Image of a tree. Removing all but the two least significant bits of each color component produces an almost completely black image.
Audio Stegnography:Audio files contain even more data:Spam Mail: 1,108 Bytes Picture of Dave: 152 KB Sneaker s Theme: 3,466 KB Ways to hide information Least significant bit (RAW) Complicated stuff we don t understand (MP3)
Applications
Usage in modern printers:- Each page of printing contains small dots of yellow colour. Example from modern practice:-Digital pictures(which contain large amounts of data) are used to hide messages on the Internet and on other communication media. Alleged use by terrorists: Alleged use by intelligence services:Intelligence service uses customized steganography software.
Conclusion
Steganography in it s multitude of forms can be equally effective in being constructive as well as destructive This presentation covers only a tiny fraction of the whole gamut that might go well beyond digital images, text, audio, and video only. Like, voice, communication channels, protocols , other text and binaries Inherently, it is neither good or bad. It is the manner in which it is used that will decide the outcome